首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 890 毫秒
1.
基于对象Petri网的离散事件系统建模仿真环境(OPMSE)   总被引:20,自引:2,他引:18  
罗雪山 《计算机仿真》2000,17(3):42-44,57
首先论述了Petri网和高级Petri网发展状况,提出了一种高级Petri网,即对象Petri网。然后介绍了基于对象Petri网的离散事件系统建模仿真环境OPMSE。文中详细介绍了OPMSE的特点与组成,并对OPMSE的核心-对象Petri网(OPN)的语法描述进行了重点介绍。  相似文献   

2.
本文分析了Petri网及其动态行为特性,扩充了事件、条件、动作等成份的内涵,引入了基于Petri网事件驱动的主动对象模型,并分析了该主动对象的性质,介绍了主动对象的实现  相似文献   

3.
本文提出了一个基于Petri网的超媒体形式化模型HPN。它采用层次组织,各层由一个扩展Petri网、若干对象以及Petri网与对象之间的映射表示,通过Petri网结构和执行语义说明超媒体的连接机制、浏览和媒体表现,具有刻画超媒体主要性质的能力。文中给出了HPN模型的模式化定义并举说明其用途。  相似文献   

4.
本文首先将模拟技术应用于Petri网中,得到模糊Petri网模型,然后基于Petri网中的库所湾量的概念,在普通Petri网的反馈控制基础上提出了一种模型Petri网的反馈控制方法。该方法使得对复杂系统的模糊Petri多控制器的系统设计成为可能。  相似文献   

5.
模糊Petri网及知识表示   总被引:6,自引:0,他引:6  
在建造专家系统中虽然有很多种知识表示方法,但都有不尽人意的地方,本文试图用一种新的方法-Petri网模型来表示知识。本文给出了Fuzzzy Petri网和广义Fuzzy Petri网两种模型,并给出了相应的推理算法,一旦专家知识用Petri网表示后,根据Petri网固有的特性,我们就能处理专家系统中并行推理、无回溯推理,反向推理等问题。  相似文献   

6.
时序逻辑电路的Petri网分析方法   总被引:4,自引:0,他引:4  
本文应用带抑止弧的增广Petri网,建立了基本门电路和常用触发器的Petri网模型,讨论了运用该模型描述同步和异步时序逻辑电路,给出了增广Petri网的矩阵描述和状态转移方程,在此基础上提出了同步和异步时序逻辑电路统一分析的Petri网方法。  相似文献   

7.
资源循环共享的Petri网的形式化设计方法   总被引:3,自引:0,他引:3  
资源共享是子Petri网耦合为总网的一种途径,其中对资源循环共享是其重要方式之一。为了研究Petri网的形式化方法,必须首先研究基于Petri网的设计,而后研究了Petri网的耦合,以往的研究多集中于竞争共享资源的方式上,很少涉及循环共享,本文在以往工作的基础上,提出了资源循环共享的Petri网设计的形式化方法,并给出了两个实例,举例说明了上述形式化设计方法。  相似文献   

8.
Pumping引理的Petri网描述—Petri网语言属型的一组判定条件   总被引:22,自引:0,他引:22  
吴哲辉 《计算机学报》1994,17(11):852-858
本文通过Pumping引理在Petri网的变迁节引发序列中的反映,揭示了对应的Petri网结构内涵,从而给出判定一个标准Petri网产生的语言分别为正规语言或上下文无关语言的充要条件,这样,就可以从网的结构直接判断其语言属型。  相似文献   

9.
逻辑推理中的Petri网应用   总被引:1,自引:0,他引:1  
本文讨论利用Petri网实现逻辑问题的推理,首先介绍了逻辑问题的Petri网模型描述方法,并举例说明了利用矩阵演算实现推理的算法。Petri网的研究与利用对开发逻辑程序并行性,提高推理效率很有意义。  相似文献   

10.
使用Petri网T-不变量求解子句的逻辑推论   总被引:4,自引:0,他引:4  
本文研究了子句逻辑规则的Petri网模型的表示及使用Petri网分析方法进行逻辑推论.基于四值逻辑和冲突变迁的概念,表示了非Horn子句Petri网模型的构造,并使用T-不变量方法解决于句推论问题.另外,本文还显示了向前推论和向后推论在子句Petri网模型中的应用.  相似文献   

11.
In this paper, we propose a cell-centered finite volume method for advective and normal flows on polyhedron meshes which is second-order accurate in space and time for smooth solutions. In order to overcome a time restriction caused by CFL condition, an implicit time discretization of inflow fluxes and an explicit time discretization of outflow fluxes are used in an iterative procedure. For an efficient computation, an 1-ring face neighborhood structure is introduced. Since it is limited to access unknown variables in an 1-ring face neighborhood structure, an iterative procedure is proposed to resolve the limitation of assembled linear system. Two types of gradient approximations, an inflow-based gradient and an average-based gradient, are studied and compared from the point of numerical accuracy. Numerical schemes are tested for an advective and a normal flow of level-set functions illustrating a behavior of the proposed method for an implicit tracking of a smooth and a piecewise smooth interface.  相似文献   

12.
XML Schema Definition (XSD) is the logical schemas of an XML model, but there is no standard format for the conceptual schema of an XML model. Therefore, we propose an XML Tree Model (XTM) as an XML conceptual schema for representing data semantics in a diagram, and also as an XML data model validator for confirming the data semantics required by users. An XTM consists of hierarchical nodes representing all the elements, and the data relationships among elements within the XSD. A rule-based algorithm and an information capacity with pre- and post-conditions are developed as the methodology for reverse engineering. The proposed algorithm consists of two rules: General Information Transformation and Data Semantic Recovering to construct an XTM. Users can draw an XTM with data relationships among elements as a result of the reverse engineering.  相似文献   

13.
建立房地产评估决策支持系统对于科学决策项目,提高项目的经济效益和社会效益至关重要,确定了一个面向对象的房地产开发评估决策模型,以投资酒店项目的决策为例,提出了评估决策知识的面向对象表示法,知识库的组织机制以及主估决策知识的维护机制和推理机制。  相似文献   

14.
We propose an efficient access control labeling scheme for secure query processing under dynamic Extensible Markup Language (XML) data streams. In recent years, XML has become an active research area. In particular, the needs for an efficient and secure query processing method for dynamic XML data in a ubiquitous data stream environment has become very important. The proposed access control labeling scheme supports the efficient processing of dynamic XML data, eliminating the need for re-labeling and secure query processing. Our proposal has the advantage of having an adaptable access control scheme for an existing XML labeling method.  相似文献   

15.
Selective disassembly involves separating a selected set of components from an assembly. Applications for selective disassembly include de-manufacturing (maintenance and recycling), and assembling. This paper presents a new methodology for performing design for selective disassembly analysis on the CAD model of an assembly. The methodology involves the following three steps: (i) identifying the components to be selectively disassembled for de-manufacturing by a software program or designer, (ii) determining an optimal (e.g. minimal cost) disassembly sequence for the selected components that involves a computationally efficient two-level reduction procedure: (a) the determination of a set of sequences with an objective of minimal component removals via a wave propagation approach that topologically order components in an assembly for selective disassembly, and (b) the evaluation of resulting sequences based on an objective function (e.g. minimal cost) to identify an optimal sequence, and (iii) Performing disassembly design decisions based on the evaluated optimal sequence. Preliminary implementation results of the selective disassembly methodology in sequencing and disassembly cost evaluation, and application of the selective disassembly technique for de-manufacturing assessment are presented.  相似文献   

16.
To date, the only effective approach for computing guaranteed bounds on the solution of an initial value problem (IVP) for an ordinary differential equation (ODE) has been interval methods based on Taylor series. This paper derives a new approach, an interval Hermite-Obreschkoff (IHO) method, for computing such enclosures. Compared to interval Taylor series (ITS) methods, for the same stepsize and order, our IHO scheme has a smaller truncation error, better stability, and requires fewer Taylor coefficients and high-order Jacobians.The stability properties of the ITS and IHO methods are investigated. We show as an important by-product of this analysis that the stability of an interval method is determined not only by the stability function of the underlying formula, as in a standard method for an IVP for an ODE, but also by the associated formula for the truncation error.  相似文献   

17.
在为信息系统构建安全体系时,人们往往将注意力放在网络安全和数据安全方面,而软件管理、物理安全等问题却容易被忽视。文章以空军某部综合管理信息系统为例,阐述如何从网络安全、物理安全、软件系统安全、数据安全等多个方面构建信息系统的综合防御体系。  相似文献   

18.
This paper treats of an estimation problem of an occupation probability of some targets in a Tegion M by an infra-red detector followed by a threshold device in a satellite.

First, a successive estimation scheme is proposed for an estimation problem of an occurrence probability of signal 1 of the 1,0 type binary signal sequence disturbed by some noise. The estimate obtained by this scheme is shown to converge to the true value with probability one and in the mean square. Then, as an application of this scheme for the occurrence probability, an estimation scheme for an occupation probability is proposed. Two examples illustrating the scheme for an occupation probability are presented.  相似文献   

19.
This study provides the following fast and simple algorithms for an interval graph: (1) an algorithm for counting the number of vertex covers, and (2) an algorithm for counting the number of minimal vertex covers.  相似文献   

20.
ON MODELING UNCERTAINTY WITH INTERVAL STRUCTURES   总被引:4,自引:0,他引:4  
In this paper, we introduce the notion of interval structures in an attempt to establish a unified framework for representing uncertain information. Two views are suggested for the interpretation of an interval structure. A typical example using the compatibility view is the rough set model in which the lower and upper approximations form an interval structure. Incidence calculus adopts the allocation view in which an interval structure is defined by the tightest lower and upper incidence bounds. The relationship between interval structures and interval-based numeric belief and plausibility functions is also examined. As an application of the proposed model, an algorithm is developed for computing the tightest incidence bounds.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号